Control: tags -1 + upstream Control: retitle -1 multipath-tools: blacklist Xen devices by default
* Andreas Pflug <pgad...@pse-consulting.de> [180811 14:47]: > Package: multipath-tools > Version: 0.4.8+git0.761c66f-10 > Severity: normal > > Since the multipath-tools package includes no standard multipath.conf, > multipathd will grab any new block device. This can lead to surprising and > hard debug effects. > e.g. attaching a device in a XEN dom0 domain will render the device > inaccessible. This corrupts xen-utils-4.1 since xend will attach the boot > device locally for pygrub, but can't release it properly because multipathd > has it. > > I suggest supplying at least a minimal multipath.conf that blacklists the > most dangerous devices by default. > -- Package-specific info: > Contents of /etc/multipath.conf: > blacklist > { > devnode "^xvd[0-9a-z]*" > } The built-in defaults in current versions appear to be: blacklist { devnode "^(ram|raw|loop|fd|md|dm-|sr|scd|st|dcssblk)[0-9]" devnode "^(td|hd|vd)[a-z]" devnode "^cciss!c[0-9]d[0-9]*" ... } Note that this doesn't match xvd*, but is this still a thing with current Xen versions, or has everything moved to vd* anyway? Chris